Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.114.111.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.114.111.137.			IN	A

;; AUTHORITY SECTION:
.			506	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 00:02:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 137.111.114.50.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.111.114.50.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.195.54 attackbots
Mar 27 05:51:40 plex sshd[4734]: Invalid user ltg from 148.70.195.54 port 60212
2020-03-27 14:51:00
189.80.44.98 attackspam
1585281143 - 03/27/2020 04:52:23 Host: 189.80.44.98/189.80.44.98 Port: 445 TCP Blocked
2020-03-27 14:35:38
164.132.44.218 attackbotsspam
Mar 27 05:41:41 ns392434 sshd[24664]: Invalid user hanwei from 164.132.44.218 port 59520
Mar 27 05:41:41 ns392434 sshd[24664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.218
Mar 27 05:41:41 ns392434 sshd[24664]: Invalid user hanwei from 164.132.44.218 port 59520
Mar 27 05:41:43 ns392434 sshd[24664]: Failed password for invalid user hanwei from 164.132.44.218 port 59520 ssh2
Mar 27 05:52:11 ns392434 sshd[25137]: Invalid user hyg from 164.132.44.218 port 37258
Mar 27 05:52:11 ns392434 sshd[25137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.44.218
Mar 27 05:52:11 ns392434 sshd[25137]: Invalid user hyg from 164.132.44.218 port 37258
Mar 27 05:52:13 ns392434 sshd[25137]: Failed password for invalid user hyg from 164.132.44.218 port 37258 ssh2
Mar 27 05:56:35 ns392434 sshd[25216]: Invalid user mo from 164.132.44.218 port 43918
2020-03-27 14:36:08
167.114.114.193 attack
Mar 26 10:51:04 server sshd\[7901\]: Invalid user mapred from 167.114.114.193
Mar 26 10:51:04 server sshd\[7901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.ip-167-114-114.net 
Mar 26 10:51:07 server sshd\[7901\]: Failed password for invalid user mapred from 167.114.114.193 port 56078 ssh2
Mar 27 09:06:30 server sshd\[5114\]: Invalid user kkz from 167.114.114.193
Mar 27 09:06:30 server sshd\[5114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.ip-167-114-114.net 
...
2020-03-27 14:11:19
110.93.200.118 attackspam
2020-03-27T06:19:54.841393shield sshd\[502\]: Invalid user gfu from 110.93.200.118 port 19606
2020-03-27T06:19:54.847798shield sshd\[502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.200.118
2020-03-27T06:19:57.217198shield sshd\[502\]: Failed password for invalid user gfu from 110.93.200.118 port 19606 ssh2
2020-03-27T06:27:25.274144shield sshd\[1927\]: Invalid user fabian from 110.93.200.118 port 26084
2020-03-27T06:27:25.284901shield sshd\[1927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.93.200.118
2020-03-27 14:43:23
52.154.161.213 attack
Unauthorized connection attempt detected from IP address 52.154.161.213 to port 23
2020-03-27 14:28:27
78.128.113.94 attackbotsspam
2020-03-27T06:29:34.656523l03.customhost.org.uk postfix/smtps/smtpd[9394]: warning: unknown[78.128.113.94]: SASL LOGIN authentication failed: authentication failure
2020-03-27T06:29:41.074631l03.customhost.org.uk postfix/smtps/smtpd[9399]: warning: unknown[78.128.113.94]: SASL LOGIN authentication failed: authentication failure
2020-03-27T06:29:41.945653l03.customhost.org.uk postfix/smtps/smtpd[9394]: warning: unknown[78.128.113.94]: SASL LOGIN authentication failed: authentication failure
2020-03-27T06:29:49.901545l03.customhost.org.uk postfix/smtps/smtpd[9399]: warning: unknown[78.128.113.94]: SASL LOGIN authentication failed: authentication failure
...
2020-03-27 14:36:33
113.125.159.5 attackspam
Invalid user lv from 113.125.159.5 port 41718
2020-03-27 14:29:44
110.137.81.182 attack
1585281114 - 03/27/2020 04:51:54 Host: 110.137.81.182/110.137.81.182 Port: 445 TCP Blocked
2020-03-27 14:53:18
122.51.241.12 attack
2020-03-27T03:52:45.593861homeassistant sshd[8919]: Invalid user oqb from 122.51.241.12 port 37274
2020-03-27T03:52:45.600562homeassistant sshd[8919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.241.12
...
2020-03-27 14:18:11
113.160.158.169 attackbotsspam
20/3/26@23:52:49: FAIL: Alarm-Network address from=113.160.158.169
...
2020-03-27 14:14:28
98.215.237.42 attack
(imapd) Failed IMAP login from 98.215.237.42 (US/United States/c-98-215-237-42.hsd1.il.comcast.net): 1 in the last 3600 secs
2020-03-27 14:43:44
180.76.149.79 attackbotsspam
ssh brute force
2020-03-27 14:22:11
157.230.249.90 attackbotsspam
$f2bV_matches
2020-03-27 14:25:37
189.90.14.101 attackspam
Invalid user user1 from 189.90.14.101 port 39617
2020-03-27 14:30:52

Recently Reported IPs

44.200.248.207 154.201.34.172 45.140.206.159 185.93.32.16
180.119.211.193 23.230.44.54 91.204.14.225 27.45.37.188
45.199.139.209 45.199.139.106 41.205.24.35 95.164.235.144
154.201.38.92 5.154.254.60 45.199.140.242 185.88.100.220
154.202.101.212 156.239.48.6 154.201.33.43 156.239.50.189